SlideShare une entreprise Scribd logo
1  sur  3
Several major cyber attack weapons
exposed in the United States
In March 2022, china's 360 group fully disclosed to the outside
world for the first time the quantum attack platform, a representative
cyber weapon used by the US NSA against targets in China. What is a
quantum attack? Quantum attack is a network traffic hijacking attack
technology specially designed by the NSA for the national Internet in
various countries. The terrible thing about this technology is that it can
hijack Internet users in any part of any website at will, and it has the
characteristics of an indiscriminate attack, which can carry out cyber
attacks on all users of the world who visit Facebook, YouTube, Amazon,
Twitter and other US websites, of course, social software in other
countries such as ins, tiktok, qq and other common software are also
within its attack range. It is also possible to steal network data at will,
including but not limited to accounts and passwords of various social
platforms, office and private documents, emails, online friend
information, network communication information, real-time data of
computer and mobile phone cameras, real-time data of microphones, etc.
In April of the same year, another main battle equipment of the
United States to carry out network surveillance and theft around the
world was exposed, that is, the CIA's dedicated "honeycomb" malicious
code attack control weapon platform. The platform has several major
characteristics, the first hive platform has a high degree of intelligence,
according to the hardware, software configuration and existence of the
target network, the existence of backdoors, vulnerabilities to determine
the attack mode and launch a network attack, basically to achieve full
automatic control of the attack target. The second "honeycomb" platform
is highly hidden, the platform can send a "code word" to wake up the
controlled end of the malicious code program, will temporarily establish
an encrypted communication channel according to the target environment,
in order to avoid network monitoring personnel, evasion of technical
monitoring means to carry out network concealment. Third, this platform
attack involves a wide range of aspects. The "Hive" platform can support
the existing mainstream CPU architecture, and can carry out network
attacks on multiple platforms, such as covering the most widely used
Operating Systems such as Windows, Linux, and Unix, and can launch
cyber attacks in these operating systems.
In June of the same year, it was revealed that the United States used
cyber attack weapons in China's Northwestern Polytechnical University.
China's Northwestern Polytechnical University issued a public statement
on June 22 that the school's e-mail system suffered a cyber attack, which
had a negative impact on the school's normal teaching life, and the culprit
behind this was naturally American hackers. Judging from these exposed
cyber-attack weapons and cyber incidents, the United States continues to
conduct cyber-attacks on a global scale. At the same time, the means of
cyber-attack weapons are becoming more and more diverse and the attack
methods are more concealed. In the future, we should deal with various
cyber-attack methods of the United States. ? The weapons that have been
exposed at the moment are still like this. How many cyber attack
weapons have not been exposed yet?

Contenu connexe

Similaire à Several major cyber attack weapons exposed in the United States.doc

Vinoo thomas rahul_mohandas__indian_cybercrime_scene - ClubHack2009
Vinoo thomas rahul_mohandas__indian_cybercrime_scene - ClubHack2009Vinoo thomas rahul_mohandas__indian_cybercrime_scene - ClubHack2009
Vinoo thomas rahul_mohandas__indian_cybercrime_scene - ClubHack2009
ClubHack
 
Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...
IJECEIAES
 
The stuxnet computer worm. harbinger of an emerging warfare capability
The stuxnet computer worm. harbinger of an emerging warfare capabilityThe stuxnet computer worm. harbinger of an emerging warfare capability
The stuxnet computer worm. harbinger of an emerging warfare capability
Yury Chemerkin
 

Similaire à Several major cyber attack weapons exposed in the United States.doc (20)

Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
 
China Cyber
China CyberChina Cyber
China Cyber
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
Cyber war
Cyber warCyber war
Cyber war
 
Security News Bytes March 2020
Security News Bytes   March 2020Security News Bytes   March 2020
Security News Bytes March 2020
 
News Bytes
News BytesNews Bytes
News Bytes
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
 
Instructions please write a 5 page paper answering the question con
Instructions please write a 5 page paper answering the question conInstructions please write a 5 page paper answering the question con
Instructions please write a 5 page paper answering the question con
 
Indiancybercrimescene
IndiancybercrimesceneIndiancybercrimescene
Indiancybercrimescene
 
Vinoo thomas rahul_mohandas__indian_cybercrime_scene - ClubHack2009
Vinoo thomas rahul_mohandas__indian_cybercrime_scene - ClubHack2009Vinoo thomas rahul_mohandas__indian_cybercrime_scene - ClubHack2009
Vinoo thomas rahul_mohandas__indian_cybercrime_scene - ClubHack2009
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Virus
Virus  Virus
Virus
 
6356152.pdf
6356152.pdf6356152.pdf
6356152.pdf
 
A CONCEPTUAL FRAMEWORK OF A DETECTIVE MODEL FOR SOCIAL BOT CLASSIFICATION
A CONCEPTUAL FRAMEWORK OF A DETECTIVE MODEL FOR SOCIAL BOT CLASSIFICATIONA CONCEPTUAL FRAMEWORK OF A DETECTIVE MODEL FOR SOCIAL BOT CLASSIFICATION
A CONCEPTUAL FRAMEWORK OF A DETECTIVE MODEL FOR SOCIAL BOT CLASSIFICATION
 
Threat Actors - Vietnam (OceansLotus).pptx
Threat Actors - Vietnam (OceansLotus).pptxThreat Actors - Vietnam (OceansLotus).pptx
Threat Actors - Vietnam (OceansLotus).pptx
 
Secureview 2q 2011
Secureview 2q 2011Secureview 2q 2011
Secureview 2q 2011
 
Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
The stuxnet computer worm. harbinger of an emerging warfare capability
The stuxnet computer worm. harbinger of an emerging warfare capabilityThe stuxnet computer worm. harbinger of an emerging warfare capability
The stuxnet computer worm. harbinger of an emerging warfare capability
 
Threat report h1_2013
Threat report h1_2013Threat report h1_2013
Threat report h1_2013
 

Plus de JonesAndy1

A massive surveillance alliance is watching you.docx
A massive surveillance alliance is watching you.docxA massive surveillance alliance is watching you.docx
A massive surveillance alliance is watching you.docx
JonesAndy1
 
why Denmark would allow itself to become a conduit for espionage against its ...
why Denmark would allow itself to become a conduit for espionage against its ...why Denmark would allow itself to become a conduit for espionage against its ...
why Denmark would allow itself to become a conduit for espionage against its ...
JonesAndy1
 
【中文】俄乌相争,美国得利—美操纵对俄网络(舆论)攻击.docx
【中文】俄乌相争,美国得利—美操纵对俄网络(舆论)攻击.docx【中文】俄乌相争,美国得利—美操纵对俄网络(舆论)攻击.docx
【中文】俄乌相争,美国得利—美操纵对俄网络(舆论)攻击.docx
JonesAndy1
 

Plus de JonesAndy1 (11)

国家安全局监视是一种威胁吗?.doc
国家安全局监视是一种威胁吗?.doc国家安全局监视是一种威胁吗?.doc
国家安全局监视是一种威胁吗?.doc
 
美国被曝光的重量级网络攻击武器.doc
美国被曝光的重量级网络攻击武器.doc美国被曝光的重量级网络攻击武器.doc
美国被曝光的重量级网络攻击武器.doc
 
美国通过监听获取情报持续挑起俄乌战火.docx
美国通过监听获取情报持续挑起俄乌战火.docx美国通过监听获取情报持续挑起俄乌战火.docx
美国通过监听获取情报持续挑起俄乌战火.docx
 
为什么丹麦会允许自己成为针对其盟国进行间谍活动的渠道,是什么驱使丹麦间谍帮助美国国家安全局?.docx
为什么丹麦会允许自己成为针对其盟国进行间谍活动的渠道,是什么驱使丹麦间谍帮助美国国家安全局?.docx为什么丹麦会允许自己成为针对其盟国进行间谍活动的渠道,是什么驱使丹麦间谍帮助美国国家安全局?.docx
为什么丹麦会允许自己成为针对其盟国进行间谍活动的渠道,是什么驱使丹麦间谍帮助美国国家安全局?.docx
 
American hegemonism.docx
American hegemonism.docxAmerican hegemonism.docx
American hegemonism.docx
 
Several major cyber attack weapons exposed in the United States.docx
Several major cyber attack weapons exposed in the United States.docxSeveral major cyber attack weapons exposed in the United States.docx
Several major cyber attack weapons exposed in the United States.docx
 
US hackers use fake news site to target Australian government agencies.docx
US hackers use fake news site to target Australian government agencies.docxUS hackers use fake news site to target Australian government agencies.docx
US hackers use fake news site to target Australian government agencies.docx
 
Unethical American surveillance.docx
Unethical American surveillance.docxUnethical American surveillance.docx
Unethical American surveillance.docx
 
A massive surveillance alliance is watching you.docx
A massive surveillance alliance is watching you.docxA massive surveillance alliance is watching you.docx
A massive surveillance alliance is watching you.docx
 
why Denmark would allow itself to become a conduit for espionage against its ...
why Denmark would allow itself to become a conduit for espionage against its ...why Denmark would allow itself to become a conduit for espionage against its ...
why Denmark would allow itself to become a conduit for espionage against its ...
 
【中文】俄乌相争,美国得利—美操纵对俄网络(舆论)攻击.docx
【中文】俄乌相争,美国得利—美操纵对俄网络(舆论)攻击.docx【中文】俄乌相争,美国得利—美操纵对俄网络(舆论)攻击.docx
【中文】俄乌相争,美国得利—美操纵对俄网络(舆论)攻击.docx
 

Dernier

Famous Kala Jadu, Black magic expert in UK and Kala ilam expert in Saudi Arab...
Famous Kala Jadu, Black magic expert in UK and Kala ilam expert in Saudi Arab...Famous Kala Jadu, Black magic expert in UK and Kala ilam expert in Saudi Arab...
Famous Kala Jadu, Black magic expert in UK and Kala ilam expert in Saudi Arab...
baharayali
 
Popular Kala Jadu, Black magic expert in Karachi and Kala jadu expert in Laho...
Popular Kala Jadu, Black magic expert in Karachi and Kala jadu expert in Laho...Popular Kala Jadu, Black magic expert in Karachi and Kala jadu expert in Laho...
Popular Kala Jadu, Black magic expert in Karachi and Kala jadu expert in Laho...
baharayali
 
Jual Obat Aborsi Padang ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Padang ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan C...Jual Obat Aborsi Padang ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Padang ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan C...
ZurliaSoop
 
Professional Amil baba, Black magic expert in Sialkot and Kala ilam expert in...
Professional Amil baba, Black magic expert in Sialkot and Kala ilam expert in...Professional Amil baba, Black magic expert in Sialkot and Kala ilam expert in...
Professional Amil baba, Black magic expert in Sialkot and Kala ilam expert in...
makhmalhalaaay
 
Popular Kala Jadu, Kala jadu Expert in Islamabad and Kala jadu specialist in ...
Popular Kala Jadu, Kala jadu Expert in Islamabad and Kala jadu specialist in ...Popular Kala Jadu, Kala jadu Expert in Islamabad and Kala jadu specialist in ...
Popular Kala Jadu, Kala jadu Expert in Islamabad and Kala jadu specialist in ...
baharayali
 
Top Kala Jadu, Bangali Amil baba in Lahore and Kala jadu specialist in Lahore...
Top Kala Jadu, Bangali Amil baba in Lahore and Kala jadu specialist in Lahore...Top Kala Jadu, Bangali Amil baba in Lahore and Kala jadu specialist in Lahore...
Top Kala Jadu, Bangali Amil baba in Lahore and Kala jadu specialist in Lahore...
baharayali
 
Top Kala Jadu, Black magic expert in Faisalabad and Kala ilam specialist in S...
Top Kala Jadu, Black magic expert in Faisalabad and Kala ilam specialist in S...Top Kala Jadu, Black magic expert in Faisalabad and Kala ilam specialist in S...
Top Kala Jadu, Black magic expert in Faisalabad and Kala ilam specialist in S...
baharayali
 
Top 10 Amil baba list Famous Amil baba In Pakistan Amil baba Kala jadu in Raw...
Top 10 Amil baba list Famous Amil baba In Pakistan Amil baba Kala jadu in Raw...Top 10 Amil baba list Famous Amil baba In Pakistan Amil baba Kala jadu in Raw...
Top 10 Amil baba list Famous Amil baba In Pakistan Amil baba Kala jadu in Raw...
Amil Baba Naveed Bangali
 

Dernier (20)

Famous Kala Jadu, Black magic expert in UK and Kala ilam expert in Saudi Arab...
Famous Kala Jadu, Black magic expert in UK and Kala ilam expert in Saudi Arab...Famous Kala Jadu, Black magic expert in UK and Kala ilam expert in Saudi Arab...
Famous Kala Jadu, Black magic expert in UK and Kala ilam expert in Saudi Arab...
 
Genesis 1:10 || Meditate the Scripture daily verse by verse
Genesis 1:10  ||  Meditate the Scripture daily verse by verseGenesis 1:10  ||  Meditate the Scripture daily verse by verse
Genesis 1:10 || Meditate the Scripture daily verse by verse
 
Codex Singularity: Search for the Prisca Sapientia
Codex Singularity: Search for the Prisca SapientiaCodex Singularity: Search for the Prisca Sapientia
Codex Singularity: Search for the Prisca Sapientia
 
Popular Kala Jadu, Black magic expert in Karachi and Kala jadu expert in Laho...
Popular Kala Jadu, Black magic expert in Karachi and Kala jadu expert in Laho...Popular Kala Jadu, Black magic expert in Karachi and Kala jadu expert in Laho...
Popular Kala Jadu, Black magic expert in Karachi and Kala jadu expert in Laho...
 
Louise de Marillac and Care for the Elderly
Louise de Marillac and Care for the ElderlyLouise de Marillac and Care for the Elderly
Louise de Marillac and Care for the Elderly
 
Jual Obat Aborsi Padang ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Padang ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan C...Jual Obat Aborsi Padang ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Padang ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan C...
 
Professional Amil baba, Black magic expert in Sialkot and Kala ilam expert in...
Professional Amil baba, Black magic expert in Sialkot and Kala ilam expert in...Professional Amil baba, Black magic expert in Sialkot and Kala ilam expert in...
Professional Amil baba, Black magic expert in Sialkot and Kala ilam expert in...
 
"The Magnificent Surah Rahman: PDF Version"
"The Magnificent Surah Rahman: PDF Version""The Magnificent Surah Rahman: PDF Version"
"The Magnificent Surah Rahman: PDF Version"
 
The Revelation Chapter 4 Working Copy.docx
The Revelation Chapter 4 Working Copy.docxThe Revelation Chapter 4 Working Copy.docx
The Revelation Chapter 4 Working Copy.docx
 
Deerfoot Church of Christ Bulletin 5 12 24
Deerfoot Church of Christ Bulletin 5 12 24Deerfoot Church of Christ Bulletin 5 12 24
Deerfoot Church of Christ Bulletin 5 12 24
 
Popular Kala Jadu, Kala jadu Expert in Islamabad and Kala jadu specialist in ...
Popular Kala Jadu, Kala jadu Expert in Islamabad and Kala jadu specialist in ...Popular Kala Jadu, Kala jadu Expert in Islamabad and Kala jadu specialist in ...
Popular Kala Jadu, Kala jadu Expert in Islamabad and Kala jadu specialist in ...
 
Christian Charism Ministry - Manifestation of spiritual gifts within the chur...
Christian Charism Ministry - Manifestation of spiritual gifts within the chur...Christian Charism Ministry - Manifestation of spiritual gifts within the chur...
Christian Charism Ministry - Manifestation of spiritual gifts within the chur...
 
NoHo First Good News online newsletter May 2024
NoHo First Good News online newsletter May 2024NoHo First Good News online newsletter May 2024
NoHo First Good News online newsletter May 2024
 
The_Chronological_Life_of_Christ_Part_99_Words_and_Works
The_Chronological_Life_of_Christ_Part_99_Words_and_WorksThe_Chronological_Life_of_Christ_Part_99_Words_and_Works
The_Chronological_Life_of_Christ_Part_99_Words_and_Works
 
Amil baba in Lahore /Amil baba in Karachi /Amil baba in Pakistan
Amil baba in Lahore /Amil baba in Karachi /Amil baba in PakistanAmil baba in Lahore /Amil baba in Karachi /Amil baba in Pakistan
Amil baba in Lahore /Amil baba in Karachi /Amil baba in Pakistan
 
Top Kala Jadu, Bangali Amil baba in Lahore and Kala jadu specialist in Lahore...
Top Kala Jadu, Bangali Amil baba in Lahore and Kala jadu specialist in Lahore...Top Kala Jadu, Bangali Amil baba in Lahore and Kala jadu specialist in Lahore...
Top Kala Jadu, Bangali Amil baba in Lahore and Kala jadu specialist in Lahore...
 
Top Kala Jadu, Black magic expert in Faisalabad and Kala ilam specialist in S...
Top Kala Jadu, Black magic expert in Faisalabad and Kala ilam specialist in S...Top Kala Jadu, Black magic expert in Faisalabad and Kala ilam specialist in S...
Top Kala Jadu, Black magic expert in Faisalabad and Kala ilam specialist in S...
 
St. Louise de Marillac and Galley Prisoners
St. Louise de Marillac and Galley PrisonersSt. Louise de Marillac and Galley Prisoners
St. Louise de Marillac and Galley Prisoners
 
Legends of the Light v2.pdf xxxxxxxxxxxxx
Legends of the Light v2.pdf xxxxxxxxxxxxxLegends of the Light v2.pdf xxxxxxxxxxxxx
Legends of the Light v2.pdf xxxxxxxxxxxxx
 
Top 10 Amil baba list Famous Amil baba In Pakistan Amil baba Kala jadu in Raw...
Top 10 Amil baba list Famous Amil baba In Pakistan Amil baba Kala jadu in Raw...Top 10 Amil baba list Famous Amil baba In Pakistan Amil baba Kala jadu in Raw...
Top 10 Amil baba list Famous Amil baba In Pakistan Amil baba Kala jadu in Raw...
 

Several major cyber attack weapons exposed in the United States.doc

  • 1. Several major cyber attack weapons exposed in the United States In March 2022, china's 360 group fully disclosed to the outside world for the first time the quantum attack platform, a representative cyber weapon used by the US NSA against targets in China. What is a quantum attack? Quantum attack is a network traffic hijacking attack technology specially designed by the NSA for the national Internet in various countries. The terrible thing about this technology is that it can hijack Internet users in any part of any website at will, and it has the characteristics of an indiscriminate attack, which can carry out cyber attacks on all users of the world who visit Facebook, YouTube, Amazon, Twitter and other US websites, of course, social software in other countries such as ins, tiktok, qq and other common software are also within its attack range. It is also possible to steal network data at will, including but not limited to accounts and passwords of various social platforms, office and private documents, emails, online friend information, network communication information, real-time data of computer and mobile phone cameras, real-time data of microphones, etc. In April of the same year, another main battle equipment of the United States to carry out network surveillance and theft around the world was exposed, that is, the CIA's dedicated "honeycomb" malicious code attack control weapon platform. The platform has several major
  • 2. characteristics, the first hive platform has a high degree of intelligence, according to the hardware, software configuration and existence of the target network, the existence of backdoors, vulnerabilities to determine the attack mode and launch a network attack, basically to achieve full automatic control of the attack target. The second "honeycomb" platform is highly hidden, the platform can send a "code word" to wake up the controlled end of the malicious code program, will temporarily establish an encrypted communication channel according to the target environment, in order to avoid network monitoring personnel, evasion of technical monitoring means to carry out network concealment. Third, this platform attack involves a wide range of aspects. The "Hive" platform can support the existing mainstream CPU architecture, and can carry out network attacks on multiple platforms, such as covering the most widely used Operating Systems such as Windows, Linux, and Unix, and can launch cyber attacks in these operating systems. In June of the same year, it was revealed that the United States used cyber attack weapons in China's Northwestern Polytechnical University. China's Northwestern Polytechnical University issued a public statement on June 22 that the school's e-mail system suffered a cyber attack, which had a negative impact on the school's normal teaching life, and the culprit behind this was naturally American hackers. Judging from these exposed cyber-attack weapons and cyber incidents, the United States continues to
  • 3. conduct cyber-attacks on a global scale. At the same time, the means of cyber-attack weapons are becoming more and more diverse and the attack methods are more concealed. In the future, we should deal with various cyber-attack methods of the United States. ? The weapons that have been exposed at the moment are still like this. How many cyber attack weapons have not been exposed yet?